If this is your first visit, be sure to
check out the Forum Rules by clicking the
link above. You may have to register
before you can post: click the register link above to proceed. To start viewing messages,
select the forum that you want to visit from the selection below.

Thats is a matter of opinion and hardware. I would beg to differ. I have around 100 realworld .cap files of wpa handshakes and I would say I have cracked around 30 of them so those are not bad odds. Plus I can run the crack in a hour or two with my hardware.

Thats is a matter of opinion and hardware. I would beg to differ. I have around 100 realworld .cap files of wpa handshakes and I would say I have cracked around 30 of them so those are not bad odds. Plus I can run the crack in a hour or two with my hardware.

pureh@te --

Can you give me some details of your conquests? That is, approx how many real world .cap files were cracked with bruteforce methods versus your wordlists?

If you play your cards close-to-the-vest that's cool ... just wanted to understand your technique(s).

kidFromBigD, Yeah like Gitsnik said I do not use brute force at all except in one way. the way I use it is I have found a ridiculous amount of people use their 10 digit phone number for their wpa key so I use crunch and add the area code + 8 chars brute force which does not take to long. Other than that I have a pretty good wordlist of about 3.5 gigs I use. Like I said I have a 20 - 30 percent success rate with real world caps which really isnt to bad when you consider how many combos of wpa there is.

kidFromBigD, Yeah like Gitsnik said I do not use brute force at all except in one way. the way I use it is I have found a ridiculous amount of people use their 10 digit phone number for their wpa key so I use crunch and add the area code + 8 chars brute force which does not take to long. Other than that I have a pretty good wordlist of about 3.5 gigs I use. Like I said I have a 20 - 30 percent success rate with real world caps which really isnt to bad when you consider how many combos of wpa there is.